


default search action
10th WOOT 2016: Austin, TX, USA
- Natalie Silvanovich, Patrick Traynor:
10th USENIX Workshop on Offensive Technologies, WOOT 16, Austin, TX, USA, August 8-9, 2016. USENIX Association 2016
Cryptographic Attacks
- Andrew Ruddick, Jeff Yan:
Acceleration Attacks on PBKDF2: Or, What Is inside the Black-Box of oclHashcat? - Hanno Böck, Aaron Zauner, Sean Devlin, Juraj Somorovsky, Philipp Jovanovic:
Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS. - Martin Grothe, Christian Mainka, Paul Rösler, Jörg Schwenk:
How to Break Microsoft Rights Management Services.
Mobile Threats
- David Rupprecht, Kai Jansen, Christina Pöpper:
Putting LTE Security Functions to the Test: A Framework to Evaluate Implementation Correctness. - Daeseon Choi, Younho Lee:
Eavesdropping One-Time Tokens Over Magnetic Secure Transmission in Samsung Pay.
Mobile Threats, Part II (The Revenge)
- Benyamin Farshteindiker, Nir Hasidim, Asaf Grosz, Yossi Oren:
How to Phone Home with Someone Else's Phone: Information Exfiltration Using Intentional Sound Noise on Gyroscopic Sensors. - Brendan Saltaformaggio, Hongjun Choi, Kristen Johnson, Yonghwi Kwon, Qi Zhang, Xiangyu Zhang, Dongyan Xu, John Qian:
Eavesdropping on Fine-Grained User Activities Within Smartphone Apps Over Encrypted Network Traffic. - Matt Spisak:
Hardware-Assisted Rootkits: Abusing Performance Counters on the ARM and x86 Architectures.
Evading Malware Detection
- Jeremy Blackthorne, Alexei Bulazel, Andrew Fasano, Patrick Biernat, Bülent Yener:
AVLeak: Fingerprinting Antivirus Emulators through Black-Box Testing. - Kyriakos K. Ispoglou, Mathias Payer:
malWASH: Washing Malware to Evade Dynamic Analysis. - Frank Imeson, Saeed Nejati, Siddharth Garg, Mahesh V. Tripunitara:
Non-Deterministic Timers for Hardware Trojan Activation (or How a Little Randomness Can Go the Wrong Way).
Same Vuln; Different System (Large-Scale Analyses)
- Sergey Bratus, Travis Goodspeed, Ange Albertini, Debanjum S. Solanky:
Fillory of PHY: Toward a Periodic Table of Signal Corruption Exploits and Polyglots in Digital Radio. - Christopher Späth, Christian Mainka, Vladislav Mladenov, Jörg Schwenk:
SoK: XML Parser Vulnerabilities.
Creative Denial of Service
- Huangxin Wang, Zhonghua Xi, Fei Li, Songqing Chen:
Abusing Public Third-Party Services for EDoS Attacks. - Eric Wustrow, Benjamin VanderSloot:
DDoSCoin: Cryptocurrency with a Malicious Proof-of-Work.
Internet of Broken Things
- Alexander Bolshev, Jason Larsen, Marina Krotofil, Reid Wightman:
A Rising Tide: Design Exploits in Industrial Control Systems. - Young-Seok Park, Yunmok Son, Hocheol Shin, Dohyun Kim, Yongdae Kim:
This Ain't Your Dose: Sensor Spoofing Attack on Medical Infusion Pump. - Hocheol Shin, Yunmok Son, Young-Seok Park, Yujin Kwon, Yongdae Kim:
Sampling Race: Bypassing Timing-Based Analog Active Sensor Spoofing Detection on Analog-Digital Systems.
Vehicle Hacking
- Yelizaveta Burakova, Bill Hass, Leif Millar, André Weimerskirch:
Truck Hacking: An Experimental Analysis of the SAE J1939 Standard. - Drew Davidson, Hao Wu, Robert Jellinek, Vikas Singh, Thomas Ristenpart:
Controlling UAVs with Sensor Input Spoofing Attacks. - Sahar Mazloom, Mohammad Rezaeirad, Aaron Hunter, Damon McCoy:
A Security Analysis of an In-Vehicle Infotainment and App Platform.

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.